On Fri, 9 Feb 2007, Radomir Zugic wrote: > Hello List, > > I'm trying to reverse engineer a usb protocol. I'm interested in how > usb devices work in general. Is the communication always passive or > can devices actively request data or perform some sort of > authentification with the driver? I see patterns in the protocol as > well, is it possible that some devices require a "keep alive" signal? > I've also tried performing what seem to be requests in the snoopy > logs, but got inconsistent replies. Is usb communication in general > request/response or should i consider the device as a finite state > automaton, where a particular sequence of commands puts the device > into a certain state (possibly writing desired data to an endpoint)? > At the moment i have a few hundred pages of logs and before I get lost > in the details I thought I could ask for some advice. Does anyone have > any experience in reverse engineering usb protocols and can give me > some pointers? I could also put the logs online if someone's > interested in taking a look. The device is a Logitech IO2 digital pen. > > Any help is much appreciated, > Rade
If you really want to learn about the USB protocols, there's no substitute for reading the official specification. Go to http://www.usb.org/developers/docs/ Alan Stern ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier. Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ Linux-usb-users@lists.sourceforge.net To unsubscribe, use the last form field at: https://lists.sourceforge.net/lists/listinfo/linux-usb-users